Results 21 to 30 of about 65,060 (255)
Security Threats and Cryptographic Protocols for Medical Wearables
In the past few years, the use of several medical devices is increasing. This paper will pay attention to a device developed to get measures of the temperature of diabetic foot.
Luis Hernández-Álvarez +3 more
doaj +1 more source
Influencés par la pléthore de concepts qu'un cryptographe doit gérer, nous abordons dans cet ouvrage différents domaines de la cryptographie et nous prenons soit le rôle du concepteur, soit celui de l'attaquant. En présentant les deux côtés de la même pièce, nous souhaitons que le lecteur commence à apprécier la beauté de cette science déroutante et qu'
openaire +3 more sources
Agile and Versatile Quantum Communication: Signatures and Secrets
Agile cryptography allows for a resource-efficient swap of a cryptographic core in case the security of an underlying classical cryptographic algorithm becomes compromised.
Stefan Richter +9 more
doaj +1 more source
Nonmonotonic cryptographic protocols [PDF]
The paper presents a new method for specifying and analyzing cryptographic protocols. The method offers several advantages over previous approaches. The technique is the first to allow reasoning about nonmonotonic protocols, which are needed for systems that rely on the deletion of information.
A.D. Rubin, P. Honeyman
openaire +1 more source
Fair Exchange in Strand Spaces [PDF]
Many cryptographic protocols are intended to coordinate state changes among principals. Exchange protocols coordinate delivery of new values to the participants, e.g. additions to the set of values they possess. An exchange protocol is fair if it ensures
Joshua D. Guttman +2 more
core +2 more sources
Is it possible to decide whether a cryptographic protocol is secure or not?
We consider the so called ``cryptographic protocols`` whose aim is to ensure some security properties when communication channels are not reliable. Such protocols usually rely on cryptographic primitives.
Hubert Comon, Vitaly Shmatikov
doaj +1 more source
Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley +1 more source
Trace Equivalence Decision: Negative Tests and Non-determinism [PDF]
We consider security properties of cryptographic protocols that can be modeled using the notion of trace equivalence. The notion of equivalence is crucial when specifying privacy-type properties, like anonymity, vote-privacy, and unlinkability.
Cheval, Vincent +2 more
core +2 more sources
The topic discussed was the intelligent design of network multimedia using BD and virtual AI technology. First of all, the authors gave a brief overview of its relevant research background, and then comprehensively analysed the advantages and disadvantages of previous scholars' research on network multimedia.
Xin Zhang
wiley +1 more source
Quantum and classical oblivious transfer: A comparative analysis
Secure multiparty computation has the potential to be a disruptive technique in the realm of data analysis and computation. It enables several parties to compute virtually any function while preserving the privacy of their inputs.
Manuel B. Santos +2 more
doaj +1 more source

